CVE-2024-34716
Prestashop
CVE-2024-34716 is a cross-site scripting (XSS) vulnerability in PrestaShop that can lead to significant security breaches. This flaw exists in versions 8.1.0 through 8.1.5 when the customer-thread feature flag is enabled. An attacker can exploit this by uploading a malicious file through the front-office contact form. When an administrator opens this file in the back office, the embedded XSS script executes. The malicious script can then access the administrator's session and security token, allowing unauthorized actions. With an SVRS of 63, while not critical, this vulnerability presents a substantial risk, especially given active exploits available. Due to the presence of active exploits, patching to version 8.1.6 or disabling the customer-thread feature flag is strongly advised to prevent potential account compromise and system-wide manipulation. Immediate action is needed to mitigate potential data breaches and maintain the integrity of the e-commerce platform.
Description
CVE-2024-34716 is a critical cross-site scripting (XSS) vulnerability affecting PrestaShop e-commerce platforms with the customer-thread feature enabled. This vulnerability allows attackers to execute malicious scripts in the context of an administrator's session, enabling them to perform any authenticated action. The SVRS score of 36 indicates a moderate risk, highlighting the need for prompt attention.
Key Insights
- High Impact: The vulnerability grants attackers complete control over the affected PrestaShop instance, allowing them to steal sensitive data, modify settings, or even compromise the entire system.
- Active Exploitation: Active exploits have been published, indicating that attackers are actively targeting this vulnerability.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning, urging organizations to take immediate action to mitigate the risk.
- In the Wild: The vulnerability is actively exploited by hackers, making it crucial for organizations to address it promptly.
Mitigation Strategies
- Update PrestaShop: Install the latest PrestaShop version (8.1.6) to patch the vulnerability.
- Disable Customer Thread Feature: If updating is not immediately possible, disable the customer-thread feature flag to mitigate the risk.
- Implement Web Application Firewall (WAF): Deploy a WAF to block malicious requests and prevent XSS attacks.
- Regular Security Audits: Conduct regular security audits to identify and address any potential vulnerabilities.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.